default search action
Andriy Panchenko 0001
Person information
- affiliation: Brandenburg University of Technology, Germany
- affiliation (former): University of Luxembourg
- affiliation (PhD 2010): RWTH Aachen University, Germany
Other persons with the same name
- Andriy Panchenko 0002 — University of Dortmund, Germany (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Savvas Zannettou, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador:
Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls. ICWSM 2024: 1082-1095 - [c43]Asya Mitseva, Andriy Panchenko:
Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages. USENIX Security Symposium 2024 - 2023
- [j5]Asya Mitseva, Marharyta Aleksandrova, Andriy Panchenko:
Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor. Comput. Secur. 132: 103374 (2023) - [j4]Alessio Buscemi, Ion Turcanu, German Castignani, Andriy Panchenko, Thomas Engel, Kang G. Shin:
A Survey on Controller Area Network Reverse Engineering. IEEE Commun. Surv. Tutorials 25(3): 1445-1481 (2023) - [c42]Witali Bartsch, Prosanta Gope, Elif Bilge Kavun, Owen Millwood, Andriy Panchenko, Aryan Mohammadi Pasikhani, Ilia Polian:
Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond. ICISSP 2023: 583-591 - [i1]José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador:
Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls. CoRR abs/2302.00598 (2023) - 2022
- [j3]Sebastian Reuter, Jens Hiller, Jan Pennekamp, Andriy Panchenko, Klaus Wehrle:
Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [c41]Asya Mitseva, Paul Thierse, Harald Hoffmann, Devran Er, Andriy Panchenko:
Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 379-397 - 2021
- [c40]Asya Mitseva, Jan Pennekamp, Johannes Lohmöller, Torsten Ziemann, Carl Hoerchner, Klaus Wehrle, Andriy Panchenko:
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages. CCS 2021: 2411-2413 - [c39]Andriy Panchenko, Asya Mitseva, Sara Knabe:
WhisperChord: Scalable and Secure Node Discovery for Overlay Networks. LCN 2021: 170-177 - [c38]Andriy Panchenko, Asya Mitseva, Torsten Ziemann, Till Hering:
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks. SecureComm (1) 2021: 123-143 - 2020
- [c37]Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. CCS 2020: 1971-1985 - [c36]Wladimir De la Cadena, Daniel Kaiser, Andriy Panchenko, Thomas Engel:
Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications. NCA 2020: 1-6 - [c35]Asya Mitseva, Marharyta Aleksandrova, Thomas Engel, Andriy Panchenko:
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor. SEC 2020: 219-233 - [c34]Asya Mitseva, Thomas Engel, Andriy Panchenko:
Analyzing PeerFlow - A Bandwidth Estimation System for Untrustworthy Environments. Sicherheit 2020: 29-40
2010 – 2019
- 2019
- [c33]Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
POSTER: Traffic Splitting to Counter Website Fingerprinting. CCS 2019: 2533-2535 - [c32]Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, Thomas Engel:
Analysis of Multi-path Onion Routing-Based Anonymization Networks. DBSec 2019: 240-258 - [c31]Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, Klaus Wehrle:
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. ICNP 2019: 1-12 - [c30]Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, Andriy Panchenko:
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. ICNP 2019: 1-2 - [c29]Jan Pennekamp, Martin Henze, Oliver Hohlfeld, Andriy Panchenko:
Hi Doppelgänger : Towards Detecting Manipulation in News Comments. WWW (Companion Volume) 2019: 197-205 - 2018
- [j2]Asya Mitseva, Andriy Panchenko, Thomas Engel:
The state of affairs in BGP security: A survey of attacks and defenses. Comput. Commun. 124: 45-60 (2018) - 2017
- [c28]Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, Thomas Engel:
Analysis of Fingerprinting Techniques for Tor Hidden Services. WPES@CCS 2017: 165-175 - 2016
- [c27]Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel:
POSTER: Fingerprinting Tor Hidden Services. CCS 2016: 1766-1768 - [c26]Andriy Panchenko, Fabian Lanze, Jan Pennekamp, Thomas Engel, Andreas Zinnen, Martin Henze, Klaus Wehrle:
Website Fingerprinting at Internet Scale. NDSS 2016 - 2015
- [c25]Fabian Lanze, Andriy Panchenko, Ignacio Ponce-Alcaide, Thomas Engel:
Hacker's toolbox: Detecting software-based 802.11 evil twin access points. CCNC 2015: 225-232 - [c24]Andriy Panchenko:
On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds. Q2SWinet@MSWiM 2015: 35-42 - [c23]Fabian Lanze, Andriy Panchenko, Thomas Engel:
A Formalization of Fingerprinting Techniques. TrustCom/BigDataSE/ISPA (1) 2015: 818-825 - 2014
- [c22]Fabian Lanze, Andriy Panchenko, Benjamin Braatz, Thomas Engel:
Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature. AsiaCCS 2014: 3-14 - [c21]Fabian Lanze, Andriy Panchenko, Ignacio Ponce-Alcaide, Thomas Engel:
Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11. Q2SWinet 2014: 87-94 - 2012
- [c20]André Egners, Dominic Gatzen, Andriy Panchenko, Ulrike Meyer:
Introducing SOR: SSH-based Onion Routing. AINA Workshops 2012: 280-286 - [c19]Fabian Lanze, Andriy Panchenko, Benjamin Braatz, Andreas Zinnen:
Clock skew based remote device fingerprinting demystified. GLOBECOM 2012: 813-819 - [c18]Andriy Panchenko, Fabian Lanze, Thomas Engel:
Improving performance and anonymity in the Tor network. IPCCC 2012: 1-10 - 2011
- [j1]Andriy Panchenko:
Privacy in Communications on the Internet. Prax. Inf.verarb. Kommun. 34(2): 102-108 (2011) - [c17]Thorsten Ries, Radu State, Andriy Panchenko:
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. AISC 2011: 77-86 - [c16]Andriy Panchenko:
Anonymous Communication in the Digital World. KiVS 2011: 221-226 - [c15]Andriy Panchenko, Otto Spaniol, André Egners, Thomas Engel:
Lightweight Hidden Services. TrustCom 2011: 533-540 - [c14]Andriy Panchenko, Lukas Niessen, Andreas Zinnen, Thomas Engel:
Website fingerprinting in onion routing based anonymization networks. WPES 2011: 103-114 - [p1]Anas Abou El Kalam, Carlos Aguilar Melchor, Stefan Berthold, Jan Camenisch, Sebastian Clauß, Yves Deswarte, Markulf Kohlweiss, Andriy Panchenko, Lexi Pimenidis, Matthieu Roy:
Further Privacy Mechanisms. Digital Privacy - PRIME 2011: 485-555 - 2010
- [b1]Andriy Panchenko:
Anonymous communication in the age of the internet. RWTH Aachen University, 2010, ISBN 3-86130-623-9, pp. 1-242 - [c13]Andriy Panchenko:
Anonymous Communication. AlgoSyn 2010: 22
2000 – 2009
- 2009
- [c12]Andriy Panchenko, Stefan Richter, Arne Rache:
NISAN: network information service for anonymization networks. CCS 2009: 141-150 - [c11]Karl-Heinz Krempels, Andriy Panchenko, Janno von Stülpnagel, Christoph Terwelp:
Interconnected Tool-assistance for Development of Agent-oriented Software Systems. KEOD 2009: 308-314 - [c10]Andriy Panchenko, Benedikt Westermann, Lexi Pimenidis, Christer Andersson:
SHALON: Lightweight Anonymization Based on Open Standards. ICCCN 2009: 1-7 - [c9]Andriy Panchenko, Johannes Renner:
Path Selection Metrics for Performance-Improved Onion Routing. SAINT 2009: 114-120 - [c8]Benedikt Westermann, Andriy Panchenko, Lexi Pimenidis:
A Kademlia-Based Node Lookup System for Anonymization Networks. ISA 2009: 179-189 - 2008
- [c7]Andriy Panchenko, Lexi Pimenidis, Johannes Renner:
Performance Analysis of Anonymous Communication Channels Provided by Tor. ARES 2008: 221-228 - [c6]Andriy Panchenko, Lexi Pimenidis:
Cross-layer attack on anonymizing networks. ICT 2008: 1-7 - [c5]Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko:
Self-certified Sybil-free pseudonyms. WISEC 2008: 154-159 - [c4]Christer Andersson, Markulf Kohlweiss, Leonardo A. Martucci, Andriy Panchenko:
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup. WISTP 2008: 64-77 - 2007
- [c3]Andriy Panchenko, Lexi Pimenidis:
Using Trust to Resist Censorship in the Presence of Collusion. SEC 2007: 409-420 - [c2]Christer Andersson, Andriy Panchenko:
Practical anonymous communication on the mobile internet using Tor. SecureComm 2007: 39-48 - 2006
- [c1]Andriy Panchenko, Lexi Pimenidis:
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. Communications and Multimedia Security 2006: 240-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint